Defensive Security Handbook (2nd Edition) cover art

Defensive Security Handbook (2nd Edition)

Best Practices for Securing Infrastructure

Preview
Get this deal Try Premium Plus free
Offer ends December 16, 2025 11:59pm GMT.
Prime members: New to Audible? Get 2 free audiobooks during trial.
Just £0.99/mo for your first 3 months of Audible.
1 bestseller or new release per month—yours to keep.
Listen all you want to thousands of included audiobooks, podcasts, and Originals.
Auto-renews at £8.99/mo after 3 months. Cancel monthly.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£8.99/month after 30 days. Renews automatically.

Defensive Security Handbook (2nd Edition)

By: William F. Reyor III, Lee Brotherston, Amanda Berlin
Narrated by: Teri Schnaubelt
Get this deal Try Premium Plus free

£8.99/mo after 3 months. Cancel monthly. Offer ends December 16, 2025 11:59pm GMT.

£8.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £12.99

Buy Now for £12.99

Only £0.99 a month for the first 3 months. Pay £0.99 for the first 3 months, and £8.99/month thereafter. Renews automatically. Terms apply. Start my membership

About this listen

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs.

This book will help you plan and design incident response, disaster recovery, compliance, and physical security; learn and apply basic penetration testing concepts through purple teaming; conduct vulnerability management using automated processes and tools; and use IDS, IPS, SOC, logging, and monitoring. You'll also bolster Microsoft and Unix systems, network infrastructure, and password management; use segmentation practices and designs to compartmentalize your network; and reduce exploitable errors by developing code securely.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2024 Amanda Berlin, Lee Brotherston, William F. Reyor III (P)2024 Ascent Audio
Programming & Software Development Security & Encryption Software Development Cybersecurity Computer Security Management Hacking Programming Technology Software

Listeners also enjoyed...

CISSP All-in-One Exam Guide, Ninth Edition cover art
Solutions Architect's Handbook cover art
The Art of Invisibility cover art
Dark Wire cover art
Zero Trust and Third-Party Risk cover art
Ghost in the Wires cover art
Project Zero Trust cover art
Security Chaos Engineering cover art
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition) cover art
No reviews yet